SECURITY RESOURCES
Offensive minded security exploit development
Application Security, Data Privacy & Development of Security Policies
Google Thwarts Employee Phishing Attack

Threat & Vulnerability Management
Critical Vulnerability in Apache Struts2

Integrated Risk Management (IRM)
VerSprite Reacts: Bloomberg’s Exposé on China

Slides & Presentations, VerSprite Security Resources, Webinars
Statistical Methods for Triaging

Research Advisories, Slides & Presentations, VerSprite Security Resources, Webinars
Abusing Insecure Windows Communication Foundation (WCF) Endpoints

VerSprite Security Resources
Threat Hunt: What’s on Your Network?

Information Security Management System (ISMS), Integrated Risk Management (IRM)
What CISOs Need to Know About Geopolitical Risk

Security Research
How Hackers Control & Steal Vehicles Remotely

Application Security, Threat & Vulnerability Management
Plain HTTP Websites Labeled “Not Secure”

VerSprite Security Resources
Ekoparty 2018

Cybersecurity Library, Ebooks & Guides, VerSprite Security Resources
Evolving with Cybercriminals: How to Respond to Social Engineering Techniques

Security Research
APT MiTM (Man-in-The-Middle) Package Injection

Security Research
Java JSON Deserialization: Memory Corruption Vulnerability

Cloud Security, Regulatory Compliance
How to Manage & Monitor Your Cloud Infrastructure

Security Research
Phishing for Files with Airmail 3 for Mac

Subscribe for Our
Updates
Please enter your email address and receive the latest updates